Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Valparaiso University (63)
- Selected Works (13)
- University of Wollongong (10)
- Walden University (9)
- Old Dominion University (6)
-
- William & Mary (5)
- University of Nevada, Las Vegas (4)
- Nova Southeastern University (3)
- SelectedWorks (3)
- University of Pennsylvania Carey Law School (3)
- Antioch University (2)
- City University of New York (CUNY) (2)
- Cleveland State University (2)
- Kennesaw State University (2)
- University of Arkansas, Fayetteville (2)
- Assumption University (1)
- Claremont Colleges (1)
- Liberty University (1)
- Louisiana State University (1)
- Merrimack College (1)
- Olivet Nazarene University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Singapore Management University (1)
- The University of Southern Mississippi (1)
- University of Louisville (1)
- University of Michigan Law School (1)
- University of San Diego (1)
- Virginia Commonwealth University (1)
- West Virginia University (1)
- Western Kentucky University (1)
- Keyword
-
- Emerging Technologies (9)
- National Security (8)
- Social Implications of ICT (8)
- Location-Based Services (7)
- Uberveillance (7)
-
- Ethics (6)
- Policing (6)
- Privacy (6)
- Surveillance (6)
- Law (4)
- Leadership (4)
- Prison (4)
- Risk (4)
- Security (4)
- Technology (4)
- Corruption (3)
- Crime (3)
- Emergency Management (3)
- Equality (3)
- Gender (3)
- Human rights (3)
- Information Security (3)
- LBS (3)
- Law Enforcement (3)
- Location-based services (3)
- M-Business (3)
- Monitoring (3)
- Tracking (3)
- Trust (3)
- Authority (2)
- Publication Year
- Publication
-
- Midwest Social Sciences Journal (63)
- Professor Katina Michael (12)
- Associate Professor Katina Michael (10)
- Walden Dissertations and Doctoral Studies (8)
- Dissertations, Theses, and Masters Projects (5)
-
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- All Faculty Scholarship (3)
- Department of Conflict Resolution Studies Theses and Dissertations (3)
- Antioch University Full-Text Dissertations & Theses (2)
- Dissertations (2)
- Dissertations, Theses, and Capstone Projects (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Sociology & Criminal Justice Theses & Dissertations (2)
- The Downtown Review (2)
- CMC Senior Theses (1)
- Communication & Theatre Arts Theses (1)
- Counseling & Student Affairs Faculty Publications (1)
- Dr. Mutaz M. Al-Debei (1)
- Dr. Steffen Roth (1)
- Economics Faculty Publications (1)
- Economics Undergraduate Honors Theses (1)
- Ed.D. Dissertations (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Faculty Publications and Presentations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Senior Capstone Projects (1)
- Honors Theses (1)
- Independent Study Project (ISP) Collection (1)
- Information Systems Undergraduate Honors Theses (1)
- Publication Type
Articles 1 - 30 of 145
Full-Text Articles in Criminology
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Midwest Social Sciences Journal
No abstract provided.
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Midwest Social Sciences Journal
Scandals within the nonprofit sector over compensation and management have increased calls for nonprofits to demonstrate accountability. Many organizations have responded by disclosing information online and providing tools that allow web-based interactions with stakeholders. The literature on nonprofits’ online accountability has found that the level of nonprofit online accountability is affected by their size, age, asset, revenue, and location, but hasn’t been examined in terms of how subsector influences online accountability. Through a web-content analysis of fifty-five nonprofits, this research investigated how subsector (arts and culture, education, health, and human services) influences online accountability using a framework of four types …
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Journal of Cybersecurity Education, Research and Practice
The purpose of this study was to investigate the effects of the anonymity of the internet and gender differences in online trolling and cybervictimization. A sample of 151 college students attending a southeastern university completed a survey to assess their internet activities and online trolling and cybervictimization. Multivariate analyses of logistic regression and ordinary least squares regression were used to analyze online trolling and cybervictimization. The results indicated that the anonymity measure was not a significant predictor of online trolling and cybervictimization. Female students were less likely than male students to engage in online trolling, but there was no gender …
Bearer Negotiable Instruments: Addressing A Financial Intelligence Gap And Identifying Criminogenic Weaknesses, Hollis B. Kegg
Bearer Negotiable Instruments: Addressing A Financial Intelligence Gap And Identifying Criminogenic Weaknesses, Hollis B. Kegg
Dissertations, Theses, and Capstone Projects
Bearer Negotiable Instruments (BNI) are a long-standing category of financial instruments used to transfer large amounts of money in ways that may not be subject to regulation, reporting, tracking, review, or oversight. There is limited information available on BNIs, and no evidence that any studies have been undertaken on BNIs alone, much less reported. Increasingly, BNIs are being used for illegal purposes including money laundering. This study gathers information about their characteristics, nature, purpose, legal status, and numbers. It also focuses on the crime risks associated with BNIs, the crime opportunities they facilitate, and the criminal weaknesses in the financial …
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
LSU Master's Theses
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …
Medical Imaging Professionals Experiencing Workplace Interprofessional Conflict: A Phenomenological Study, Robert Carroll Moody
Medical Imaging Professionals Experiencing Workplace Interprofessional Conflict: A Phenomenological Study, Robert Carroll Moody
Department of Conflict Resolution Studies Theses and Dissertations
Workplace interprofessional conflict in hospitals presented serious concerns regardingpatient care delivery and hospital efficiency at the systemic level. Literature evaluating conflict in hospitals inconsistently defined interprofessional conflict and oversampled nurses and physicians in research studies. An unknown systemic factor was likely influencing interprofessional conflict between healthcare professionals. Complex systems theory, the theory of professions, and social conflict theories were utilized to organize the literature review and guide research design targeting allied health professionals and their lived experiences with interprofessional conflict. Medical imaging professionals were selected as a purposeful sample within the larger population of allied health. Interpretive phenomenology was used …
Learning From The Lived Experiences Of African American Senior Executives In Fortune 500 Organizations: A Transcendental Phenomenological Study Of Black Corporate Trailblazers, Otis G. Jarvis
Department of Conflict Resolution Studies Theses and Dissertations
African American Senior Executives (AASE) exist as a group of American citizens who hold senior management roles in Fortune 500 organizations. AASE members are responsible for decision-making in a diverse number of industries but represent a small group of leaders in Fortune 500 organizations. The purpose of this qualitative transcendental phenomenological study was to examine the lived experiences of AASE in a Fortune 500 organization in the United States. The qualitative study examined through semi-structured interviews the experiences of eleven senior executives in Fortune 500 organizations in the United States. This phenomenological study examined how the lived experience of each …
The Digital Footprint Effect: A Grounded Theory On The Influence Of Social Media On Human Resource Managers’ Hiring Decisions, Tanya Pawlowski
The Digital Footprint Effect: A Grounded Theory On The Influence Of Social Media On Human Resource Managers’ Hiring Decisions, Tanya Pawlowski
Department of Conflict Resolution Studies Theses and Dissertations
For over a decade, the Society for Human Resource Management (SHRM) has reported the increasing practice of hiring managers accessing social media profiles to screen job applicants (Bates, 2008). This qualitative research study investigated the role of social media in organizational hiring practices and what factors may influence human resource hiring managers’ decisions. A grounded theory methodology was applied to interview 21 human resource hiring managers with open-ended structured questions. Based on the researcher’s data collection and grounded theory data analysis, the findings showed that social media profiles play a crucial role in organizational hiring decisions when a human resource …
The R.I.C.O. Act: America's Approach Against The Mafia And Corporate Crime, Andrew Brooks
The R.I.C.O. Act: America's Approach Against The Mafia And Corporate Crime, Andrew Brooks
Honors Theses
A full explanation of how the federal government has made provisions to take down the Mafia that can and have been used against corporate crime through something known as the R.I.C.O. Act of 1970, and how the courts have failed to interpret the laws that were developed with the intent to neutralize both crime syndicates and corporate crimes.
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Midwest Social Sciences Journal
No abstract provided.
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Of Movements And Markets: Religious Competition And The Problem Of Black Church Relevance, Omar M. Mcroberts
Of Movements And Markets: Religious Competition And The Problem Of Black Church Relevance, Omar M. Mcroberts
Midwest Social Sciences Journal
Why do cross-denominational public religious movements such as the Southern Christian Leadership Conference appear, despite the market-like competitive behavior of churches? Religious economy theory offers one set of explanations, based on a supply-side approach to the dynamics of numeric religious growth and decline. Namely, ecumenical movements are engaged by denominations, or religious firms, in membership decline. The history of national Black ecumenical movements, however, points to ways that religious economic theorizing fails to account for the multiple modes of social consciousness regarding church survival that motivate institutional religious activity. Black churches have existed not merely as a market but as …
Gender And Corporate Crime: Do Women On The Board Of Directors Reduce Corporate Bad Behavior?, Ido Baum, Dalit Gafni, Ruthy Lowenstein Lazar
Gender And Corporate Crime: Do Women On The Board Of Directors Reduce Corporate Bad Behavior?, Ido Baum, Dalit Gafni, Ruthy Lowenstein Lazar
Michigan Journal of Gender & Law
Public debate on mandating gender representation on boards of directors in the United States is close to a boiling point. California introduced a mandatory quota in 2018 only to see it constitutionally disqualified in 2022, and the Nasdaq Stock Market followed suit with new diversity rules in 2021 for all corporations listed on the exchange. While public discourse focuses on corporate performance, not much is known about the link between gender diversity and corporate normative obedience.
In this study we explore the relationship between boardroom gender representation and corporate compliance with the law. We examine the impact of gender diversity …
Event-Related Potentials Of Individuals With Attention-Deficit/Hyperactivity Disorder Performing The Attention Network Task, P. Dennis Rodriguez, Justin E. Stauffacher
Event-Related Potentials Of Individuals With Attention-Deficit/Hyperactivity Disorder Performing The Attention Network Task, P. Dennis Rodriguez, Justin E. Stauffacher
Midwest Social Sciences Journal
The current study sought to investigate the neural basis of attention-deficit/hyperactivity disorder (ADHD) by examining the performance of individuals with ADHD on the Attentional Networks Test (ANT) by Fan, McCandliss, Sommer, Raz, and Posner (2002), while recording electroencephalography (EEG) utilizing event-related potentials (ERP) methodology. Fifty-seven university students were divided into three groups: control, ADHD-inattentive subtype (ADHD-IA), and ADHD-combined/hyperactive impulsive subtype (ADHD-C/HI). The average peak amplitudes of the P300 waveform for each group were compared and analyzed for performance on each attention network measured by the ANT: the alerting network, the orienting network, and the executive control network. The average P3 …
Different Maternal Responses And Cognitions In Hypothetical Power Bouts: Relations To Parenting Styles, Kathy L. Ritchie
Different Maternal Responses And Cognitions In Hypothetical Power Bouts: Relations To Parenting Styles, Kathy L. Ritchie
Midwest Social Sciences Journal
In order to explore how parental styles and maternal cognitions interacted with difficult extended discipline episodes called power bouts, 88 mothers were categorized as either Authoritative, Authoritarian, Permissive, or Uninvolved. Mothers then read six hypothetical vignettes about a 4-year-old child misbehaving and were asked how they would respond to the child and how they would respond a second time if the child did not behave. These open-ended responses were coded on a scale of increasing power assertiveness with 0 being giving in and 5 indicating using punishment through spanking, removal of privilege, or time out. Using Bell and Chapman’s (1986) …
Civiic: Cybercrime In Virginia: Impacts On Industry And Citizens Final Report, Randy Gainey, Tancy Vandecar-Burdin, Jay Albanese, Thomas Dearden, James Hawdon, Katalin Parti
Civiic: Cybercrime In Virginia: Impacts On Industry And Citizens Final Report, Randy Gainey, Tancy Vandecar-Burdin, Jay Albanese, Thomas Dearden, James Hawdon, Katalin Parti
Sociology & Criminal Justice Faculty Publications
[First paragraph] Victimization from cybercrime is a major concern in Virginia, the US, and the world. As individuals and businesses spend more time online, it becomes increasingly important to understand cybercrime and how to protect against it. Such an understanding is dependent on valid and reliable baseline data that identifies the specific nature, extent, and outcomes of cybercrime activity. A better understanding of cybercrime activity is needed to target and prevent it more effectively, minimize its consequences, and provide support for both individual and corporate victims. Before that can occur, however, better baseline data are required, and this project was …
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Graduate Theses, Dissertations, and Problem Reports
This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …